Ensuring confidentiality and availability of sensitive data over a network system under cyber threats

2021 ◽  
Vol 214 ◽  
pp. 107697
Author(s):  
Xiaoyu Zhang ◽  
Maochao Xu ◽  
Gaofeng Da ◽  
Peng Zhao
Author(s):  
Dr.Yasser A. Seleman

Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply.   As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies. Knowing security holes and contributes significantly to the wireless network is immune from attempts to infiltrate and penetration design Keywords—Protocol: Language is between computers connected via the network, in order to exchange information. If we define the language of the Protocol technology, we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages.


Author(s):  
Wellington Amponsah ◽  
Simon Amonovi ◽  
Kwabena Gyeke-Lartey ◽  
Taiwo E. Ajagunsegun

Ghana’s Banking sector has seen much improvement and this is evidence by the establishment of Commercial Banks, Rural and Community Banks and Savings and Loans. Cyber-threats and the measures necessary to counter them in the Banking industry are the major security issue of the hour that the bank is facing. Information security issue is vital and more critical when it wants to implement and apply IT into its operations. Penetration and testing uses and techniques those hackers employ in penetrating the network system to verify presence of vulnerabilities in the network. This research demonstrates how to perform and identify the security strength and reveal the vulnerabilities, and possible exploits in the security of the internal network and misconfiguration of firewall of the Bank using penetration testing.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 193 ◽  
Author(s):  
Anuj Kumar Baitha ◽  
Prof. Smitha Vinod

Session Hijacking is an attack which is basically used to gain the unauthorized access between an authorized session connections. This is usually done to attack the social network website and banking websites in order to gain the access over the valid session as well as over the website too. These attacks are one of the commonly experienced cyber threats in today’s network. Most of the websites and networks are vulnerable from this kind of attack.  For providing the protection I have given the multiple ways to protecting from this session hijacking attack. I have especially focused on one of the major attacks in this session hijacking attack SSL Strip attack which play very vital role in this kind of attack. Sometimes this session hijacking attack is also known as the Man in the Middle attack (MIMA).In this paper, I have covered many security mechanisms to stay away and protect you and the network. This session hijacking attack is very dangers for the security perspective. Even it can steal all users’ most sensitive data. This can create a big loss for the users financially. From all these types of attack, I have proposed many mechanisms to help the users to stay away from the attack. The main objective of this paper is to give detail information of session hijacking and countermeasure from session hijacking attacks.


2012 ◽  
Vol 132 (10) ◽  
pp. 853-861 ◽  
Author(s):  
Takuya Ishitani ◽  
Ryoichi Hara ◽  
Hiroyuki Kita ◽  
Eiji Kogure ◽  
Yuki Mitsukuri ◽  
...  

2013 ◽  
Vol E96.B (3) ◽  
pp. 730-736 ◽  
Author(s):  
Liru LU ◽  
Hiroshi HARADA ◽  
Ryuhei FUNADA ◽  
Chin-Sean SUM

Author(s):  
Masashi OKADA ◽  
Masahide HATANAKA ◽  
Keiichiro KAGAWA ◽  
Shinichi MIYAMOTO

2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


2019 ◽  
Vol 7 (5) ◽  
pp. 1766-1777
Author(s):  
Supriya J. ◽  
Srusti K.S. ◽  
amana G ◽  
S. Sukhaniya Ragani ◽  
Raghavendra S. ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document